Venafi / blueprint-securesoftwarepipeline
For engineers and security teams driving fast and secure software supply chains
☆83Updated 2 years ago
Alternatives and similar repositories for blueprint-securesoftwarepipeline
Users that are interested in blueprint-securesoftwarepipeline are comparing it to the libraries listed below
Sorting:
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆172Updated 5 months ago
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆138Updated 2 years ago
- Count distinct contributor of Snyk watched repos across several SCM☆32Updated 10 months ago
- ☆117Updated last month
- OWASP Foundation Web Respository☆55Updated 2 years ago
- ☆16Updated last year
- Compares and analyzes GCP IAM roles.☆77Updated 2 months ago
- A collection of DoD and Federal Government Cloud Computing Resources☆48Updated 4 years ago
- Rego policies for enterprise-scale Compliance-as-Code with OPA Conftest.☆58Updated last year
- OWASP Foundation Web Respository☆82Updated 3 months ago
- This repo. is archived. The utility is now at: https://github.com/CycloneDX/sbom-utility☆60Updated 2 years ago
- ☆112Updated 4 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆50Updated last week
- SCP management tool☆131Updated last year
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- A tool to create, transform and attest VEX metadata☆136Updated last week
- Scan GitHub Actions Workflow logs for IOCs☆15Updated this week
- GitHub action to scan container images with Palo Alto Networks' Prisma Cloud☆57Updated last month
- Evaluate source control (GitHub) security posture☆249Updated 2 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆108Updated last year
- Rapidly apply hundreds of security controls in Azure☆184Updated 2 weeks ago
- A docker container to simplify and secure the use of Infrastructure as Code (IaC)☆73Updated this week
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 2 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- Create custom auto-remediation solutions using serverless functions in the cloud.☆53Updated last year
- The S2C2F Project is a group working within the OpenSSF's Supply Chain Integrity Working Group formed to further develop and continuously…☆208Updated 3 months ago
- Audit Dependency-Track findings and policy violations via policy as code☆33Updated last week
- A compliance analysis tool which enables organizations to more quickly articulate their compliance posture and also generate supporting e…☆41Updated this week
- CloudSplaining on AWS Managed Policies☆43Updated this week
- A utility to (re-)import findings and language data into DefectDojo☆43Updated 7 months ago